Tag

Server Hardening

1 views collected around this technical thread.

360 Tech Engineering
360 Tech Engineering
Feb 11, 2019 · Information Security

Security Strategies for Elasticsearch: Network, OS, Server, and Access Controls

The article outlines practical Elasticsearch security measures—including network isolation, removal of public IPs, non‑root operation, port changes, and user authentication with the open‑source Search Guard plugin—to protect against data leaks and unauthorized access.

Search GuardServer Hardeningaccess control
0 likes · 6 min read
Security Strategies for Elasticsearch: Network, OS, Server, and Access Controls
Tencent Cloud Developer
Tencent Cloud Developer
Mar 1, 2017 · Information Security

MySQL Ransomware Attacks: Security Analysis and Hardening Guide

MySQL has become a ransomware target because many servers expose the database to the internet with empty or weak passwords, so administrators should audit open ports, enforce strong authentication, restrict access via security groups or iptables, bind services to internal IPs, and avoid using root or high‑privilege accounts to harden MySQL, MongoDB, and Redis against compromise.

MongoDB hardeningMySQL securityRedis security
0 likes · 8 min read
MySQL Ransomware Attacks: Security Analysis and Hardening Guide